| 1990 | Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings Jean-Jacques Quisquater, Joos Vandewalle |
| 1989 | 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. Jean-Jacques Quisquater, Marc Girault |
| 1989 | A Cryptanalysis of Step Dieter Gollmann, William G. Chambers |
| 1989 | A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen |
| 1989 | A Fast Elliptic Curve Cryptosystem. Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
| 1989 | A Fats Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences. Réjane Forré |
| 1989 | A General Zero-Knowledge Scheme (Extended Abstract). Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker |
| 1989 | A Generalization of El Gamal's Public Key Cryptosystem. Walter J. Jaburek |
| 1989 | A Key Distribution System Based On Any One-Way Function (Extended Abstract). George I. Davida, Yvo Desmedt, René Peralta |
| 1989 | A New Multiple Key Cipher and an Improved Voting Scheme. Colin Boyd |
| 1989 | A Practical Protocol for Large Group Oriented Networks. Yair Frankel |
| 1989 | A Secure Public-key Authentication Scheme. Zvi Galil, Stuart Haber, Moti Yung |
| 1989 | A Simple Technique for Diffusing Cryptoperiods. Stig Fr. Mjølsnes |
| 1989 | A Single Chip 1024 Bits RSA Processor. André Vandermeulebroecke, Etienne Vanzieleghem, Tony Denayer, Paul G. A. Jespers |
| 1989 | An Alternative to the Fiat-Shamir Protocol. Jacques Stern |
| 1989 | An Identity-Based Key-Exchange Protocol. Christoph G. Günther |
| 1989 | An Information-Theoretic Treatment of Homophonic Substitution. Hakon N. Jendal, Yves J. B. Kuhn, James L. Massey |
| 1989 | Atkin's Test: News From the Front. François Morain |
| 1989 | Cartesian Authentication Schemes. Marijke De Soete, Klaus Vedder, Michael Walker |
| 1989 | Counting Functions Satisfying a Higher Order Strict Avalanche Criterion. Sheelagh Lloyd |
| 1989 | Cryptanalysis of Short RSA Secret Exponents (Abstract). Michael J. Wiener |
| 1989 | Cryptanalysis of Video Encryption Based on Space-Filling Curves. Michael Bertilsson, Ernest F. Brickell, Ingemar Ingemarsson |
| 1989 | Cryptanalysis of a Modified Rotor Machine. Peer Wichmann |
| 1989 | Cryptel - The Practical Protection of an Existing Electronic Mail System. Hedwig Cnudde |
| 1989 | Deciphering Bronze Age Scripts of Crete - The Case of Linear A. Yves Duhoux |
| 1989 | Detection of Disrupters in the DC Protocol. Jurjen N. Bos, Bert den Boer |
| 1989 | Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. Tatsuaki Okamoto, Kazuo Ohta |
| 1989 | Efficient Identification and Signatures for Smart Cards (Abstract). Claus-Peter Schnorr |
| 1989 | Efficient Offline Electronic Checks (Extended Abstract). David Chaum, Bert den Boer, Eugène van Heyst, Stig Fr. Mjølsnes, Adri Steenbeek |
| 1989 | Everything in NP can be Argued in Gilles Brassard, Claude Crépeau, Moti Yung |
| 1989 | Factoring by Electronic Mail. Arjen K. Lenstra, Mark S. Manasse |
| 1989 | Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. Ueli M. Maurer |
| 1989 | Faster Primality Testing (Extended Abstract). Wieb Bosma, Marc-Paul van der Hulst |
| 1989 | Feedforward Functions Defined By de Bruijn Sequences. Zong-Duo Dai, Kencheng Zeng |
| 1989 | Full Secure Key Exchange and Authentication with no Previously Shared Secrets. Josep Domingo-Ferrer, Llorenç Huguet i Rotger |
| 1989 | How Easy is Collision Search? Application to DES (Extended Summary). Jean-Jacques Quisquater, Jean-Paul Delescaille |
| 1989 | How to Break the Direct RSA-Implementation of Mixes. Birgit Pfitzmann, Andreas Pfitzmann |
| 1989 | How to Improve Signature Schemes. Gilles Brassard |
| 1989 | How to Keep Authenticity Alive in a Computer Network. Fritz Bauspieß, Hans-Joachim Knobloch |
| 1989 | How to Say "No". Albrecht Beutelspacher |
| 1989 | Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai |
| 1989 | Informational Divergence Bounds for Authentication Codes. Andrea Sgarro |
| 1989 | Key Minimal Authentication Systems for Unconditional Secrecy. Philippe Godlewski, Chris J. Mitchell |
| 1989 | Keysystem Sequences with a Good Linear Complexity Profile for Every STrating Point. Harald Niederreiter |
| 1989 | Legal Requirements Facing New Signature Technology. Mireille Antoine, Jean-François Brakeland, Marc Eloy, Yves Poullet |
| 1989 | Linear Complexity Profiles and Continued Fractions. Muzhong Wang |
| 1989 | More Efficient Match-Making and Satisfiability: Bert den Boer |
| 1989 | Non-linearity of Exponent Permutations. Josef Pieprzyk |
| 1989 | Nonlinearity Criteria for Cryptographic Functions. Willi Meier, Othmar Staffelbach |
| 1989 | On the Complexity and Efficiency of a New Key Exchange System. Johannes Buchmann, Stephan Düllmann, Hugh C. Williams |
| 1989 | On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random. Thomas Beth, Zong-Duo Dai |
| 1989 | On the Design of Permutation P in DES Type Cryptosystems. Lawrence Brown, Jennifer Seberry |
| 1989 | On the Linear Complexity of Feedback Registers (Extended Abstract). Agnes Hui Chan, Mark Goresky, Andrew Klapper |
| 1989 | On the Security of Schnorr's Pseudo Random Generator. Rainer A. Rueppel |
| 1989 | Online Cash Checks. David Chaum |
| 1989 | Parallel Generation of Recurring Sequences. Christoph G. Günther |
| 1989 | Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies. Joan Boyar, Katalin Friedl, Carsten Lund |
| 1989 | Prepositioned Shared Secret and/or Shared Control Schemes. Gustavus J. Simmons |
| 1989 | Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract). Tzonelih Hwang, T. R. N. Rao |
| 1989 | Random Mapping Statistics. Philippe Flajolet, Andrew M. Odlyzko |
| 1989 | Security in Open Distributed Processing. Charles Siuda |
| 1989 | Some Conditions on the Linear Complexity Profiles of Certain Binary Sequences. Glyn Carter |
| 1989 | Some Ideal Secret Sharing Schemes. Ernest F. Brickell |
| 1989 | Sorting out Zero-Knowledge. Gilles Brassard, Claude Crépeau |
| 1989 | Technical Security: The Starting Point. Jan Van Auseloos |
| 1989 | The Adolescence of Public-Key Cryptography (Abstract). Whitfield Diffie |
| 1989 | The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). Michael Waidner, Birgit Pfitzmann |
| 1989 | The Use of Fractions in Public-Key Cryptosystems. Hartmut Isselhorst |
| 1989 | Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Michael Waidner |
| 1989 | Varying Feedback Shift Registers. Yves Roggeman |
| 1989 | Verifiable Disclosure of Secrets and Applications (Abstract). Claude Crépeau |
| 1989 | Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). Jean-Jacques Quisquater, André Bouckaert |
| 1989 | Zero-Knowledge Proofs of Computational Power (Extended Summary). Moti Yung |